APT (Advanced Persistent Threat) is a network attack in which an unauthorized person gains access to your network and stays there undetected for a long period of time. These attacks are by nature very elusive, and intended to steal data from your network or organization. They use sophisticated techniques using unique malwares to exploit vulnerabilities in your system. These unique malwares are very hard to detect and clean using your conventional signature-based antivirus or IPS.

XGS

IBM Security Network Protection appliances build on the time-tested security of the IBM Security intrusion prevention portfolio. They introduce new levels of security from advanced threats, enhanced network visibility and granular control across applications, users and groups.

Most of people in your organization have multiple devices. They bring along these smart devices into your environment everyday. While they can bring about much productivity that boosts your business, they pose additional risks inside your network. All employees who know your SSID password can easily enter your network and do things you’re not aware of.

That brings us to Multi-Factor Authentication. You can’t just let people enter your network through password (something they know). They would also have to produce something they have, within a limited period of time. This ensures visibility and assurance in your organization’s mobile environment.

Advanced Threat Protection provides real-time threat protection by following the attack sequence from initial contact through many attack stages, while offering flexible controls to defend in a manner commensurate to the customer’s risk tolerance. It also extends the existing security ecosystem with integrations with network solutions, like FireEye, and SIEM technologies, such as QRadar.

Banet is a South Korean company established in 2001, as an IT service company specialized in implementation and operation of financial systems, providing database security solution developed by its own technologies. One of its main products is DataGenor TDM, which manages and secures your test data for security and compliance purposes.

App Scan

IBM Application Security solutions helps customers reduce the risk of their applications being exploited with comprehensive tools to analyze applications for vulnerabilities, remediate those vulnerabilities, and harden applications to prevent malware.

A penetration test, colloquially known as a pen test, is an authorised simulated attack on a computer system that looks for security weaknesses, potentially gaining access to the system's features and data

Enterprise Mobility Management (EMM) is the set of people, processes and tehcnology focused on managing Mobile Devices, Mobile Computing services in a business context. As more workers have bought smartphone and tablet computing devices and have sought support for using these devices in the workplace, EMM has become increasingly significant

BigFix is a system management software product developed by IBM for managing large groups of computer running windows, MacOS, VMWare ESX, Linux or Unix as well as various mobile operating system such as Windows Phone, Android, and iOS

IBM Resilient’s mission is to help organizations thrive in the face of cyberattacks and business crises. IBM Resilient helped create the market more than five years ago by building the industry-leading Incident Response Platform.

Finding your weak points is only half the battle. As a penetration tester, it is your job to perform a through assessment and communicate what needs to be done to reduce the risk of breach. Pinpoint the weaks links in the attack chain, and validate and prioritize vulnerabilities seamlessy with Nexpose closed-loop integration using Top Remediation reports

OVERVIEW

Metasploit is the leading software used by penetration testers around the world. A collaboration between the open source community and Rapid7, Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments, providing true security risk intelligence. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in consolidated reports.

Attackers are always developing new exploits and attack methods. Metasploit penetration testing software helps you use their own weapons against them. Utilizing an ever-growing database of exploits, you can safely simulate real-world attacks on your network to train your security team to spot and stop the real thing.